General

  • Target

    Emiditor.exe

  • Size

    8.1MB

  • Sample

    221127-wtfgascd7s

  • MD5

    e08805d6085d6402dcaeb253e4375a09

  • SHA1

    2c79a1203c135aa1a7d5fbed566c94983278b40c

  • SHA256

    b559413c43d76b67e8b068c842a0a615b04d6d687be860e18da1adc43dfe5b5e

  • SHA512

    517d723f46c11a10eb303d655ffca77b1bc3f863450208e659cfea70276f15a7d921d52c04597d035faebb7278e66ff55bbb45b451568f11bc176650bd149db9

  • SSDEEP

    98304:iFBz9bmxmtOfP7TI/OKIdSOwSmGrjvvLYq5dkcDNckgHDJHZt:qBzQxmtOfzsWKgwS1jvvH5uFHn

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

65.108.204.97:1337

Mutex

PreIzXewwN

Targets

    • Target

      Emiditor.exe

    • Size

      8.1MB

    • MD5

      e08805d6085d6402dcaeb253e4375a09

    • SHA1

      2c79a1203c135aa1a7d5fbed566c94983278b40c

    • SHA256

      b559413c43d76b67e8b068c842a0a615b04d6d687be860e18da1adc43dfe5b5e

    • SHA512

      517d723f46c11a10eb303d655ffca77b1bc3f863450208e659cfea70276f15a7d921d52c04597d035faebb7278e66ff55bbb45b451568f11bc176650bd149db9

    • SSDEEP

      98304:iFBz9bmxmtOfP7TI/OKIdSOwSmGrjvvLYq5dkcDNckgHDJHZt:qBzQxmtOfzsWKgwS1jvvH5uFHn

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Modifies Installed Components in the registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

2
T1112

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

5
T1082

Peripheral Device Discovery

2
T1120

Tasks